First published: Mon Jan 16 2017(Updated: )
It was discovered that the URLClassLoader class in the Networking component of OpenJDK did not properly check access control context when downloading class files. An untrusted Java application or applet could use this flaw to make HTTP requests to locations that should not be accessible, bypassing certain Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6-update_131 | |
Oracle JDK | =1.7-update_121 | |
Oracle JDK | =1.8-update_111 | |
Oracle JDK | =1.8-update_112 | |
Oracle JRE | =1.6-update_131 | |
Oracle JRE | =1.7-update_121 | |
Oracle JRE | =1.8-update_111 | |
Oracle JRE | =1.8-update_112 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.